Re: [kvm-devel] KVM Test result, kernel 3959211b.. , userspace 5bf06ab9..

2007-08-27 Thread Avi Kivity
Zhang, Jingke wrote: 1. Could not create kvm guest with memory =2040 http://otc-qa.sh.intel.com/kvm/bugzilla/show_bug.cgi?id=6 https://sourceforge.net/tracker/index.php?func=detailaid=1736307group_ id=180599atid=893831 This is only on an i386 host, right? In x86_64 this should work.

Re: [kvm-devel] Vista 32 Premium 32 bit gets blue screen on boot

2007-08-27 Thread Avi Kivity
Haydn Solomon wrote: Ok. I've tested the list of bios images for booting vista premium 32 bit. The results are as follows: Sorry, I regenerated the bios images incorrectly, so some of these images are stale. Unfortunately, this includes the images at the working-nonworking crossover. I've

Re: [kvm-devel] [RFC][PATCH 5/6][KVM VIRTIO] Add the network device code

2007-08-27 Thread Christian Borntraeger
Am Samstag, 25. August 2007 schrieb Dor Laor: + * Permission is hereby granted, free of charge, to any person obtaining a copy Hi Dor, some of your patch lines seem line-wrapped. Is there place where I can download the whole series? Thanks Christian

Re: [kvm-devel] Vista 32 Premium 32 bit gets blue screen on boot

2007-08-27 Thread Alexey Eremenko
This problem is already reported here: http://sourceforge.net/tracker/index.php?func=detailaid=1780032group_id=180599atid=893831 -- -Alexey Eremenko Technologov - This SF.net email is sponsored by: Splunk Inc. Still

Re: [kvm-devel] [PATCH 1/4] [HYPERCALL] Add hypercalls functions

2007-08-27 Thread Christian Borntraeger
Am Samstag, 25. August 2007 schrieb Dor Laor: + asm ( call hypercall_addr\n Hi Dor, This cannot work, because hypercall_addr is currently not defined in todays kvm.git: # grep -R hypercall_addr * drivers/kvm/kvm.h:unsigned char *hypercall_addr); # IIRC there was a

[kvm-devel] Userspace hypercalls?

2007-08-27 Thread Anthony Liguori
I've never really thought much about them until now. What's the case for supporting userspace hypercalls? The current way the code works is a little scary. Hypercalls that aren't handled by kernelspace are deferred to userspace. Of course, kernelspace has no idea whether userspace is actually

[kvm-devel] [PATCH 1/3] Implement emulator_write_phys()

2007-08-27 Thread Anthony Liguori
Since a hypercall may span two pages and is a gva, we need a function to write to a gva that may span multiple pages. emulator_write_phys() seems like the logical choice for this. Signed-off-by: Anthony Liguori [EMAIL PROTECTED] diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c index

Re: [kvm-devel] [PATCH 2/3] Refactor hypercall infrastructure

2007-08-27 Thread Avi Kivity
Anthony Liguori wrote: This patch refactors the current hypercall infrastructure to better support live migration and SMP. It eliminates the hypercall page by trapping the UD exception that would occur if you used the wrong hypercall instruction for the underlying architecture and replacing

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Avi Kivity
Anthony Liguori wrote: I've never really thought much about them until now. What's the case for supporting userspace hypercalls? The current way the code works is a little scary. Hypercalls that aren't handled by kernelspace are deferred to userspace. Of course, kernelspace has no idea

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Avi Kivity
Avi Kivity wrote: This means a pvnet driver can be used either directly with a virtual interface on the host, or having some userspace processing in qemu. Also, 'qmu -net user -net model=pv' if you're unlucky enough not to have root. -- Any sufficiently difficult bug is indistinguishable

Re: [kvm-devel] [PATCH 1/3] Implement emulator_write_phys()

2007-08-27 Thread Avi Kivity
Anthony Liguori wrote: Since a hypercall may span two pages and is a gva, we need a function to write to a gva that may span multiple pages. emulator_write_phys() seems like the logical choice for this. @@ -962,8 +962,35 @@ static int emulator_write_std(unsigned long addr,

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Avi Kivity
Avi Kivity wrote: Anthony Liguori wrote: I've never really thought much about them until now. What's the case for supporting userspace hypercalls? The current way the code works is a little scary. Hypercalls that aren't handled by kernelspace are deferred to userspace. Of course,

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Avi Kivity
Avi Kivity wrote: Thinking a little more about this, it isn't about handling hypercalls in userspace, but about handling a virtio sync() in userspace. So how about having a KVM_HC_WAKE_CHANNEL hypercall (similar to Xen's event channel, but assymetric) that has a channel parameter. The

Re: [kvm-devel] Vista 32 Premium 32 bit gets blue screen on boot

2007-08-27 Thread Haydn Solomon
No problem, glad I can contribute to this wonderful project in any way I can. I've retested the bios images and below shows results. Please bear in mind that I only tested for successful boot and didn't complete the install. bios-kvm-35-3-g599a0fb.binblue screen bios-kvm-35-4-gb70bff2.bin

[kvm-devel] [PATCH 3/3] KVM paravirt-ops implementation

2007-08-27 Thread Anthony Liguori
diff --git a/arch/i386/Kconfig b/arch/i386/Kconfig index f952493..ceacc66 100644 --- a/arch/i386/Kconfig +++ b/arch/i386/Kconfig @@ -237,6 +237,13 @@ config VMI at the moment), by linking the kernel to a GPL-ed ROM module provided by the hypervisor. +config KVM_GUEST +

[kvm-devel] [PATCH 0/3] KVM paravirtualization framework

2007-08-27 Thread Anthony Liguori
This patchset refactors KVM's paravirtualization support to better support guest SMP and cross platform migration. It also introduces a bare-bones KVM paravirt_ops implementation. I've tested this on VT and it works nicely. I'm having trouble getting a bzImage to boot on SVM so I haven't been

Re: [kvm-devel] [PATCH 1/3] Implement emulator_write_phys()

2007-08-27 Thread Avi Kivity
Anthony Liguori wrote: On Mon, 2007-08-27 at 18:45 +0300, Avi Kivity wrote: Anthony Liguori wrote: Since a hypercall may span two pages and is a gva, we need a function to write to a gva that may span multiple pages. emulator_write_phys() seems like the logical choice for this.

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Anthony Liguori
On Mon, 2007-08-27 at 19:47 +0300, Avi Kivity wrote: Avi Kivity wrote: Thinking a little more about this, it isn't about handling hypercalls in userspace, but about handling a virtio sync() in userspace. So how about having a KVM_HC_WAKE_CHANNEL hypercall (similar to Xen's event

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Avi Kivity
Anthony Liguori wrote: On Mon, 2007-08-27 at 19:47 +0300, Avi Kivity wrote: Avi Kivity wrote: Thinking a little more about this, it isn't about handling hypercalls in userspace, but about handling a virtio sync() in userspace. So how about having a KVM_HC_WAKE_CHANNEL hypercall

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Anthony Liguori
On Mon, 2007-08-27 at 20:36 +0300, Avi Kivity wrote: Anthony Liguori wrote: On Mon, 2007-08-27 at 19:47 +0300, Avi Kivity wrote: Avi Kivity wrote: Thinking a little more about this, it isn't about handling hypercalls in userspace, but about handling a virtio sync() in

[kvm-devel] [PATCH 0/3] KVM paravirtualization framework

2007-08-27 Thread Alexey Eremenko
Anthony Liguori wrote: I've tested this on VT and it works nicely. Excuse me, but you said several months ago something about kvm-xen, which doesn't requires VT CPUs. Will you publish or merge that technology ? (as I don't have VT-capable CPU at Home)

Re: [kvm-devel] [PATCH 1/3] Implement emulator_write_phys()

2007-08-27 Thread Avi Kivity
Anthony Liguori wrote: On Mon, 2007-08-27 at 20:26 +0300, Avi Kivity wrote: Anthony Liguori wrote: On Mon, 2007-08-27 at 18:45 +0300, Avi Kivity wrote: Anthony Liguori wrote: Since a hypercall may span two pages and is a gva, we need a function to write

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Avi Kivity
Anthony Liguori wrote: On Mon, 2007-08-27 at 20:36 +0300, Avi Kivity wrote: Anthony Liguori wrote: On Mon, 2007-08-27 at 19:47 +0300, Avi Kivity wrote: Avi Kivity wrote: Thinking a little more about this, it isn't about handling hypercalls in userspace,

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Anthony Liguori
On Mon, 2007-08-27 at 20:51 +0300, Avi Kivity wrote: Anthony Liguori wrote: On Mon, 2007-08-27 at 20:36 +0300, Avi Kivity wrote: Yes, that would be better except that the latency may be unacceptable. Hmm. Good point. I keep saying kvm can have great I/O because the

Re: [kvm-devel] [PATCH 1/3] Implement emulator_write_phys()

2007-08-27 Thread Anthony Liguori
On Mon, 2007-08-27 at 18:45 +0300, Avi Kivity wrote: Anthony Liguori wrote: Since a hypercall may span two pages and is a gva, we need a function to write to a gva that may span multiple pages. emulator_write_phys() seems like the logical choice for this. @@ -962,8 +962,35 @@

Re: [kvm-devel] [PATCH 1/3] Implement emulator_write_phys()

2007-08-27 Thread Anthony Liguori
On Mon, 2007-08-27 at 18:45 +0300, Avi Kivity wrote: Anthony Liguori wrote: Since a hypercall may span two pages and is a gva, we need a function to write to a gva that may span multiple pages. emulator_write_phys() seems like the logical choice for this. @@ -962,8 +962,35 @@

[kvm-devel] Hello Kvm-devel

2007-08-27 Thread Duane Farley
Those who deny freedom to others, deserve it not for themselves. The happiest conversation is that of which nothing is distinctly remembered but a general effect of pleasing impression. Can anything be so elegant as to have few wants, and to serve them one's self? Love is a state in which a

[kvm-devel] [BUG] kvm_lock: inconsistent lock state

2007-08-27 Thread Luca Tettamanti
Hi, I just got this warning when doing a 'rmmod kvm-intel': = [ INFO: inconsistent lock state ] 2.6.23-rc3-libata-g28e8351a-dirty #93 - inconsistent {hardirq-on-W} - {in-hardirq-W} usage. udevd/2800 [HC1[1]:SC0[0]:HE0:SE1] takes:

[kvm-devel] 33高t级t文t秘t职t业t化t训t练33

2007-08-27 Thread adff
高*级*文*秘*职*业*化*训*练 中 国 ・上 海・ 2007 年 09 月 8-9 日 中 国 ・北 京・ 2007 年 09 月 1-2 日 中 国 ・深 圳・ 2007 年 10 月 20-21 日 ━━━ ● 授 课 对 象 企业中层行政管理干部和文秘工作人员,包括办公室主任、行政部经理、董事长秘书、 总经理秘书、行政助理、行政主管、行政部门文员等

[kvm-devel] [PATCH 2/3] KVM paravirt-ops implementation (v2)

2007-08-27 Thread Anthony Liguori
A very simple paravirt_ops implementation for KVM. Future patches will add more sophisticated optimizations. The goal of having this presenting this now is to validate the new hypercall infrastructure and to make my patch queue smaller. Signed-off-by: Anthony Liguori [EMAIL PROTECTED] diff

[kvm-devel] [PATCH 0/3] KVM paravirtualization framework (v2)

2007-08-27 Thread Anthony Liguori
This patchset refactors KVM's paravirtualization support to better support guest SMP and cross platform migration. It also introduces a bare-bones KVM paravirt_ops implementation. I've tested this on VT and it works nicely. I'm having trouble getting a bzImage to boot on SVM so I haven't been

[kvm-devel] [PATCH 1/3] Refactor hypercall infrastructure (v2)

2007-08-27 Thread Anthony Liguori
This patch refactors the current hypercall infrastructure to better support live migration and SMP. It eliminates the hypercall page by trapping the UD exception that would occur if you used the wrong hypercall instruction for the underlying architecture and replacing it with the right one

[kvm-devel] [PATCH 3/3] Add the paravirtualization CPUID entry to QEMU (v2)

2007-08-27 Thread Anthony Liguori
This adds a CPUID entry for the paravirtualization feature bitmap. We can do this unconditionally because the guest requires that both the feature CPUID entry and the signature CPUID entry exists to enable paravirtualization. This means that guest will never enable paravirtualization if either

Re: [kvm-devel] [PATCH 3/3] Add the paravirtualization CPUID entry to QEMU (v2)

2007-08-27 Thread Avi Kivity
Anthony Liguori wrote: This adds a CPUID entry for the paravirtualization feature bitmap. We can do this unconditionally because the guest requires that both the feature CPUID entry and the signature CPUID entry exists to enable paravirtualization. This means that guest will never enable

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Luca
On 8/27/07, Avi Kivity [EMAIL PROTECTED] wrote: Anthony Liguori wrote: On Mon, 2007-08-27 at 20:36 +0300, Avi Kivity wrote: userspace can attach a signal to the eventfd if it wants a synchronous exit (does eventfd allow fcntl(F_SETOWN)?) Which would address the latency issue nicely.

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Avi Kivity
Luca wrote: On 8/27/07, Avi Kivity [EMAIL PROTECTED] wrote: Anthony Liguori wrote: On Mon, 2007-08-27 at 20:36 +0300, Avi Kivity wrote: userspace can attach a signal to the eventfd if it wants a synchronous exit (does eventfd allow fcntl(F_SETOWN)?) Which would

Re: [kvm-devel] Userspace hypercalls?

2007-08-27 Thread Anthony Liguori
On Mon, 2007-08-27 at 23:01 +0300, Avi Kivity wrote: Luca wrote: if it isn't guaranteed to be the current thread, we're back with scheduler involvement, and possibly cacheline bouncing. It's possible to use pthread_sigmask() to block the signal on all threads but one. But this

[kvm-devel] Linux guests failing on SVM

2007-08-27 Thread Anthony Liguori
Using the KVM git tree on a 32-bit host, I can't boot a kernel with -kernel. a wrmsr() to EFER is resulting in the guest getting a GP. The very curious thing is the call is wrmsr_safe() so I don't think it should be failing. Moreover, if I allow wrmsr to succeed, the guest just hangs. I know

Re: [kvm-devel] [PATCH 1/4] [HYPERCALL] Add hypercalls functions

2007-08-27 Thread Anthony Liguori
On Fri, 2007-08-24 at 16:57 -0700, Dor Laor wrote: The hypercalls can be called with various parameters number. Both x86_64 and i386 are supported. Signed-off-by: Dor Laor [EMAIL PROTECTED] --- +static inline int +__hypercall6(unsigned int nr, unsigned long p1, unsigned long p2, +

Re: [kvm-devel] [PATCH 3/4] HYPERCALL] Update exit reason for vmcall

2007-08-27 Thread Anthony Liguori
On Fri, 2007-08-24 at 16:58 -0700, Dor Laor wrote: diff --git a/drivers/kvm/svm.c b/drivers/kvm/svm.c index cc674bf..9bfd11e 100644 --- a/drivers/kvm/svm.c +++ b/drivers/kvm/svm.c @@ -1022,6 +1022,11 @@ static int halt_interception(struct vcpu_svm *svm, struct kvm_run *kvm_run) static

Re: [kvm-devel] [PATCH 0/4] Hypercall additions

2007-08-27 Thread Anthony Liguori
FWIW, I don't see 2/4 of this series. Regards, Anthony Liguori On Fri, 2007-08-24 at 16:56 -0700, Dor Laor wrote: The following patch set add some hypercall functionality: - Improve/ease userspace hypercall handling - Add hypercall functions for x86_64 and i386. - Add registration

Re: [kvm-devel] [PATCH 2/4] [HYPERCALL] Enable userspace too include kvm_para.

2007-08-27 Thread Anthony Liguori
Ignore my last email about this patch not existing :-) Regards, Anthony Liguori On Fri, 2007-08-24 at 16:58 -0700, Dor Laor wrote: Since some hypercalls can be handled in userspace, it needs to include kvm_para too. Chande kernel types into user and add includes for them and for page_size.

Re: [kvm-devel] [PATCH 4/4] [Hypercall] Allow modules registeration for hypercalls.

2007-08-27 Thread Anthony Liguori
I don't really like the idea of having other modules register hypercalls. The hypercall address space is fixed and should be maintained by KVM. I think things like virtio are rare and important enough, that it warrants having kvm.ko know enough about them to provide a higher level registration